Optimal relay selection for secure NOMA systems under untrusted users

K Cao, B Wang, H Ding, T Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… who can access the messages of trusted users due to the … untrusted users, we in this paper
propose two relay selection (… (AF) protocols based optimal relay selection (ie, DORS and …

User-pair selection in multiuser cooperative networks with an untrusted relay

B He, Q Ni, J Chen, L Yang, L Lv - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… In contrast, from the curve of the BRS scheme, we can see that the secrecy rate of the best
relay selection in “N relays with a single userpair” scenario reduces as N increases, such …

Secure relay selection for two way amplify-and-forward untrusted relaying networks

T Mekkawy, R Yao, N Qi, Y Lu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… In this paper, the relay selection of two-way untrusted relays … at all other non-selected
relays. Particularly, we propose a … a two way AF HD relay network, where two users, A and B, …

AN-aided relay-selection scheme for securing untrusted RF-EH relay systems

A Mabrouk, A El Shafie, K Tourki… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
… in a wireless powered-untrusted cooperative communication (WPUCC) … untrusted relays.
To minimize the energy consumption of the network, we propose a secure adaptive relay-based …

Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers

A Kuhestani, A Mohammadi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, a joint relay selection and power allocation (JRP) scheme is proposed to enhance
the physical layer security of a cooperative network, where a multiple antennas source …

Security-aware relaying scheme for cooperative networks with untrusted relay nodes

L Sun, P Ren, Q Du, Y Wang… - IEEE Communications …, 2014 - ieeexplore.ieee.org
… jamming (CJ), which exploits the cooperating users to transmit the artificial noise, is a … CJ
and relay selection [3]–[5]. Common to [1]–[5] is that all of them assume the relays are trusted, …

Cooperation with an untrusted relay: A secrecy perspective

X He, A Yener - IEEE Transactions on Information Theory, 2010 - ieeexplore.ieee.org
untrusted relay channel, and proceed to investigate this question for two types of relay
relay and the destination is noiseless, the optimal relaying scheme in this case is choosing …

Energy-efficient secure transmission design for the Internet of Things with an untrusted relay

D Chen, W Yang, J Hu, Y Cai, X Tang - IEEE Access, 2018 - ieeexplore.ieee.org
untrusted relay networks without the direct link. Furthermore, the ergodic secrecy rate was
examined in [10] by proposing a suboptimal user selection … based optimal relay selection

Energy-efficient secure multiuser scheduling in energy harvesting untrusted relay networks

D Chen, Y Cheng, X Wang, W Yang… - Journal of …, 2019 - ieeexplore.ieee.org
… The maximum scheduling scheme is conventional user selection that maximizes the … at the
untrusted relay by selecting the user with the lowest channel gain of the relay links. For these …

On security and throughput for energy harvesting untrusted relays in IoT systems using NOMA

C So-In, H Tran, DD Tran, S Heng… - IEEE …, 2019 - ieeexplore.ieee.org
untrusted relays. • We investigate three cooperative TAS and relay selection schemes, ie,
the best-BS-random-relay … consisting of an untrusted relay required by users at far distances, …